1) Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? (300 words)
Need to 2 Replies discussion for same question for 150 words too.
1) Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? (300 words)
Need to 2 Replies discussion for same question for 150 words too.
-Visit MeetMe website and compare it to Facebook. In what ways is it similar to Facebook, and in what ways is it different? Which do you prefer, and why?
-MeetMe- another social network aimed at meeting new people
-2pages worth APA style
-Reference page
After completing the reading this week, we reflect on a few key concepts this week:
Discuss Howell and Mendez’s three perspectives on follower-ship. Note how these behaviors influence work productivity.
What is the big five personality model?
What is the Myers-Briggs test? How is it similar to the Big five model? How is it different than the Big five model?
Please be sure to answer all the questions above in the initial post.
Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:
Ask an interesting, thoughtful question pertaining to the topic
Expand on the topic, by adding additional thoughtful information
Answer a question posted by another student in detail
Share an applicable personal experience
Provide an outside source
Make an argument
At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.
Operations Security – Risk management policies
Scenario :
“You arrive at work on Monday morning to discover that your computer is not working properly. It stops responding and restarts every few minutes. Unexpectedly, you see unusual error messages popping up and hear some strange sounds from the speakers.”
Discussion Question:
One and half page is fine
Managing Risk
Your company has decided to implement a human resource demographic portal. Under the system envisioned, employees would be able to use an online internal web page to change various personal information items themselves, such as, address phone, etc. In addition, the employees would be able to change limited payroll related items, such as 401k deduction percentages or amounts, optional United Way contributions, and the number of federal and state exemptions to be claimed. Along with thie portal would be the ability to view, download, and print current and YTD pay information, including the current paycheck and check “stub”.
Under the current system, employees must go to the HR office to make any changes – there is no online access.
Your company already requires direct deposit for all employees, and under the new system, pay stubs would no longer be printed. Employees would be able to do this as needed through the portal.
There are many potential risks associated with this project.
Remember that sometimes, risks are acceptable and can be taken, so long they are identified and a strategy to address the risk is presented. For example, driving a car is a risky venture, but to address that risk we have driver’s education (mitigation), manufacturing safety standards (mitigation), insurance (transference), and staying at home (avoidance). Driving an older, unsafe vehicle by an unlicensed and uninsured motorist could be considered acceptance,
.
Turn in as much as needed. (Sometimes less is more, sometimes more is more; it’s your call.)
Support your strategies as needed with external references, and make sure your answer directly address the potential risks with the human resource demographic portal.
Que 1:
Discuss the advantage of acquiring and maintaining intellectual property rights
Que 2:
Discuss this statement: “How do you know if the company is progressing or not?” What separates “vanity metrics” and real, actionable metrics.
Que 3:
Discuss this statement: “With the rapid advances in science, growing market opportunities in convergent technology marketplaces and sustained levels of public and private investment in research and development means there are ample opportunities for technology-based entrepreneurs”. Discuss the opportunities for technology-based entrepreneurs.
NOTE: My assignment will need actual references from EBSCO, Google scholar, or Semantic Scholar with a website link at the end
Please following the requirement which is in the PDF file(cs261 assignment instruction), and give the same output as the PDF file shows.
Deadline: 1/14
Pages: 4-6
This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.Your paper should meet these requirements:
weekly log for it project
Update (10/24):
The tasks in this assignment are to extend the HashTable class that is currently defined in the file “hashtable.py” (located in MS Teams -> General -> Files -> Code).
By extending it we will increase the functionality of the HashTable class (by adding more methods) and will make it more flexible (e.g. can resize itself as needed) and robust (e.g. no issues/errors when it is full and an item is added).
The ways to extend the class, and thus the requirements for this assignment are as follows.
1. Override Python len()
function to work with HashTable in a specific way – Using def __len__
will override the Python len()
function. The way this is implemented should be to return the number of items stored in the hash table (note: this is *not* the same as HashTable’s “size” field).
2. Override Python in
operator – This will be done using def __contains__
and should be implemented so this operator will then return a boolean when used in statements of the form 54 in myhashtable
. For this example, the function should return True if 54 is an existing key in the HashTable instance myhashtable
, and False if it is not.
3. Override Python del
operator – This is done by using def __delitem__
and should allow for a key/value pair to be removed from an instance of HashTable (e.g. del h[54]
). Think about how you want to handle cases when deleting a key that was involved with collisions. Be sure to include in the documentation for this method any assumptions/restrictions on how this can be used.
4. Modify exiting put
method to resize an instance as needed – The current HashTable implementation is limited in that it is not able to gracefully handle the case when an item is added to already full HashTable instance. This method should be modified to deal with this more gracefully, and should resize the instance for the user. Be sure to include documentation here describing exactly when you choose to resize and how you select an appropriate new size (remember that prime numbers are preferred for sizes, in order to avoid clustering, or an even more severe but subtle issue).
All of those methods should be clearly documented to describe how and why the implementation is defined as it is. You will also want to use unittest on this assignment. One good use case for unittest will be to add a few items (and maybe even delete) one, and then to use unittest to verify that the slots and data fields are equal to what you expect. All of the extensions that you’ve added should be tested as well.
Lastly, for grading, you will want to ensure that you’re program can be run through a test script. The test script will look like the code shown at bottom of this assignment description. When it is run we should expect output similar to what is shown in this screenshot.
test_hashtable.py (the final test script will vary slightly from this):
from <
# instantiate a HashTable object
h = HashTable(7)
# store keys and values in the object
h[6] = ‘cat’
h[11] = ‘dog’
h[21] = ‘bird’
h[27] = ‘horse’
print(“-“*10, “keys and values”, “-“*10)
print(h.slots)
print(h.data)
# check that data was stored correctly
print(“-“*10, “data check”, “-“*10)
if h.data == [‘bird’, ‘horse’, None, None, ‘dog’, None, ‘cat’]:
print(” + HashTable ‘put’ all items in correctly”)
else:
print(” – items NOT ‘put’ in correctly”)
# check that ‘in’ operator works correctly
print(“-“*10, “in operator”, “-“*10)
if 27 in h:
print(” + ‘in’ operator correctly implemented”)
else:
print(” – ‘in’ operator NOT working”)
# delete operator
del h[11]
# check that len() function is implemented and works
print(“-“*10, “len() function”, “-“*10)
if len(h) == 3:
print(” + ‘len’ function works properly”)
else:
print(” – ‘len’ function NOT working”)
# “in” operator (returns a boolean)
print(“-“*10, “len() after deletion”, “-“*10)
if 11 not in h:
print(” + ‘in’ operator works correctly after 11 was removed”)
else:
print(” – ‘in’ operator OR ‘del’ NOT working”)
# check that data was also removed
print(“-“*10, “data after deletion”, “-“*10)
if h.data == [‘bird’, ‘horse’, None, None, None, None, ‘cat’]:
print(” + data is correct after deletion”)
else:
print(” – data not correctly removed after deletion”)